Formally analyzed m-coupon protocol with confirmation code (MCWCC)

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automatic Code Generation Based on Formally Analyzed Uml Statechart Models

This paper aims at providing an efficient implementation pattern for source code level instantiation of UML statcharts. The code generation is based on extended hierarchical automata, the formal description method used as an intermediate representation of statecharts for model checking purposes, this way enabling automatic implementation of formally analyzed models. Since statecharts can automa...

متن کامل

Representing Semantically Analyzed C++ Code with Reprise

A prominent stumbling block in the spread of the C++ programming language has been a lack of programming and analysis tools to aid development and maintenance of C++ systems. One way to make the job of tool developers easier and to increase the quality of the tools they create is to factor out the common components of tools and provide the components as easily (re)used building blocks. Those bu...

متن کامل

Formal Security Analysis and Improvement of a Hash-Based NFC M-Coupon Protocol

Near field communication (NFC) is a Radio Frequency (RF) technology that allows data to be exchanged between devices that are in close proximity. We formally analyse a hash based NFC mobile coupon protocol using formal methods (Casper/FDR2 ). We discover a few possible attacks which break the requirements of the protocol. We propose solutions to address these attacks based on two different thre...

متن کامل

Coupon Collecting with Quotas

We analyze a variant of the coupon collector’s problem, in which the probabilities of obtaining coupons and the numbers of coupons in a collection may be non-uniform. We obtain a finite expression for the generating function of the probabilities to complete a collection and show how this generalizes several previous results about the coupon collector’s problem. Also, we provide applications abo...

متن کامل

Formally Proved Security of Assembly Code Against Leakage

In his keynote speech at CHES 2004, Kocher advocated that sidechannel attacks were an illustration that formal cryptography was not as secure as it was believed because some assumptions (e.g., no auxiliary information is available during the computation) were not modeled. This failure is due to the fact that formal methods work with models rather than implementations. Of course, we can use form...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES

سال: 2019

ISSN: 1303-6203

DOI: 10.3906/elk-1712-288